Scan OS information and Traceroute (nmap -A pull-flv-l1-xg.bytecdn.cn)
Nmap scan report for pull-flv-l1-xg.bytecdn.cn (138.113.19.15)
Host is up (0.034s latency).
Not shown: 930 closed ports
PORT STATE SERVICE VERSION
80/tcp open http nginx
81/tcp open http nginx
82/tcp open http nginx
85/tcp open http nginx
88/tcp open http nginx
89/tcp open http nginx
90/tcp open http nginx
443/tcp open ssl/http nginx
|_http-cors: GET POST PUT DELETE OPTIONS
| http-server-header:
| Cdn Cache Server V2.0
|_ nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=*.bytecdn.cn
| Subject Alternative Name: DNS:*.bytecdn.cn, DNS:bytecdn.cn
| Not valid before: 2023-09-26T00:00:00
|_Not valid after: 2024-10-26T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
801/tcp open http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
843/tcp open unknown
1080/tcp open http nginx
1088/tcp open http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
1089/tcp open http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
1443/tcp open ssl/ies-lm?
1900/tcp open http nginx
1935/tcp open http nginx
2000/tcp open http nginx
2323/tcp open 3d-nfsd?
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions, TLSSessionReq:
| HTTP/1.0 404 FAIL
| Content-length:5
| Connection:Close
|_ ERROR
2381/tcp open http nginx
2382/tcp open http nginx
2383/tcp open http nginx
3000/tcp open http nginx
4000/tcp open http nginx
5000/tcp open http nginx
5001/tcp open http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
5002/tcp open http nginx
5566/tcp open http nginx
6666/tcp open irc?
|_irc-info: Unable to open connection
7000/tcp open http nginx
7001/tcp open http nginx
7002/tcp open http nginx
7070/tcp open http nginx
7443/tcp open ssl/http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=default.chinanetcenter.com/organizationName=\xE7\xBD\x91\xE5\xAE\xBF\xE7\xA7\x91\xE6\x8A\x80\xE8\x82\xA1\xE4\xBB\xBD\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8\xE5\x8E\xA6\xE9\x97\xA8\xE5\x88\x86\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE7\xA6\x8F\xE5\xBB\xBA\xE7\x9C\x81/countryName=CN
| Subject Alternative Name: DNS:default.chinanetcenter.com, DNS:*.i3839.com, DNS:*.ourdvsss.com, DNS:*.ziroom.com, DNS:*.blued.com, DNS:sstatic.chunboimg.com, DNS:*.ip138.com, DNS:m.bbs.3839.com, DNS:microgame.5054399.net, DNS:nitrome.com.4399.com, DNS:s3.chunboimg.com, DNS:jssdk.3304399.net, DNS:*.lof3.xyz, DNS:*.rax0mai4.xyz, DNS:*.4399.cn, DNS:s0.chunboimg.com, DNS:*.3839.com, DNS:www.miniclip.com.4399pk.com, DNS:*.1zhe.com, DNS:ip138.com, DNS:d.3839app.net, DNS:maangh2.chinanetcenter.com, DNS:*.9k9.cn, DNS:*.4399.com, DNS:s1.chunboimg.com, DNS:cdn.h5wan.4399sj.com, DNS:*.service.kugou.com, DNS:lvs.lxdns.net, DNS:*.wscdns.com, DNS:*.walla-app.com, DNS:*.bldimg.com, DNS:*.5054399.com, DNS:*.4399youpai.com, DNS:*.3839app.com, DNS:*.v.cdn20.com, DNS:hls.vda.v.cdn20.com, DNS:*.cntv.cdn20.com, DNS:*.img4399.com, DNS:s2.chunboimg.com, DNS:*.cntv.lxdns.com, DNS:*.ourdvsssvip.com, DNS:*.v.wscdns.com, DNS:*.iwan4399.com, DNS:4399.cn
| Not valid before: 2023-10-25T00:00:00
|_Not valid after: 2024-11-15T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
7777/tcp open http nginx
8000/tcp open http nginx
8001/tcp open http nginx
8008/tcp open http nginx
8009/tcp open http nginx
|_ajp-methods: Failed to get a valid response for the OPTION request
8010/tcp open http nginx
8011/tcp open http nginx
8022/tcp open http nginx
8080/tcp open http nginx
8081/tcp open http nginx
8082/tcp open http nginx
8083/tcp open http nginx
8084/tcp open http nginx
8085/tcp open http nginx
8088/tcp open http nginx
8089/tcp open http nginx
8090/tcp open http nginx
8443/tcp open ssl/http nginx
|_http-cors: GET POST PUT DELETE OPTIONS
|_http-server-header: nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=*.bytecdn.cn
| Subject Alternative Name: DNS:*.bytecdn.cn, DNS:bytecdn.cn
| Not valid before: 2023-09-26T00:00:00
|_Not valid after: 2024-10-26T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
8888/tcp open http nginx
9000/tcp open http nginx
9001/tcp open http nginx
9002/tcp open http nginx
9080/tcp open http nginx
9081/tcp open http nginx
9090/tcp open http nginx
9091/tcp open http nginx
9099/tcp open http nginx
9100/tcp open jetdirect?
9101/tcp open jetdirect?
9103/tcp open jetdirect?
9200/tcp open http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
9998/tcp open http nginx
9999/tcp open http nginx
11111/tcp open http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
12000/tcp open http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
19350/tcp open unknown
30000/tcp open http nginx
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port2323-TCP:V=7.70%I=7%D=11/19%Time=655A0EA5%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConne
SF:ction:Close\r\n\r\nERROR")%r(HTTPOptions,3E,"HTTP/1\.0\x20404\x20FAIL\r
SF:\nContent-length:5\r\nConnection:Close\r\n\r\nERROR")%r(RTSPRequest,3E,
SF:"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConnection:Close\r\n\r
SF:\nERROR")%r(TLSSessionReq,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-lengt
SF:h:5\r\nConnection:Close\r\n\r\nERROR")%r(FourOhFourRequest,3E,"HTTP/1\.
SF:0\x20404\x20FAIL\r\nContent-length:5\r\nConnection:Close\r\n\r\nERROR")
SF:%r(SIPOptions,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConne
SF:ction:Close\r\n\r\nERROR");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port6666-TCP:V=7.70%I=7%D=11/19%Time=655A0EAC%P=x86_64-redhat-linux-gnu
SF:%r(RPCCheck,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xf
SF:f\xff\0\0\0\x07\x01\0\0\0")%r(SSLSessionReq,1C,"\x80\x03\0\x04\0\0\0\x1
SF:4\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(TLSSessio
SF:nReq,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0
SF:\0\0\x07\x01\0\0\0")%r(Kerberos,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\
SF:0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(SMBProgNeg,1C,"\x80\x
SF:03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\
SF:0\0")%r(X11Probe,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\x
SF:ff\xff\xff\0\0\0\x07\x01\0\0\0")%r(TerminalServer,1C,"\x80\x03\0\x04\0\
SF:0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(Not
SF:esRPC,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\
SF:0\0\0\x07\x01\0\0\0")%r(WMSRequest,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x
SF:02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(afp,1C,"\x80\x03\0
SF:\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0"
SF:);
Device type: phone|general purpose|WAP|firewall|media device|specialized
Running (JUST GUESSING): Google Android 7.X (96%), Linux 3.X|2.6.X|4.X (96%), IPCop 2.X (87%), Tiandy embedded (87%), AVtech embedded (87%)
OS CPE: cpe:/o:google:android:7.1.2 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3.0 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:ipcop:ipcop:2.0 cpe:/o:linux:linux_kernel:3.4 cpe:/o:linux:linux_kernel:4.9
Aggressive OS guesses: Android 7.1.2 (Linux 3.10) (96%), Linux 2.6.18 - 2.6.22 (94%), Linux 3.0 (92%), Linux 3.2 (92%), Tomato firmware (Linux 2.6.22) (88%), IPCop 2.0 (Linux 2.6.32) (87%), Linux 2.6.32 (87%), IPCop 2 firewall (Linux 3.4) (87%), Linux 4.9 (87%), Tiandy NVR (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops
TRACEROUTE (using port 554/tcp)
HOP RTT ADDRESS
1 0.20 ms 208.76.251.177
2 0.54 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.65 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1)
4 0.87 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5 12.69 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6 20.92 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7 33.53 ms be2668.ccr22.den01.atlas.cogentco.com (154.54.87.30)
8 33.89 ms be2402.rcr21.b006467-6.den01.atlas.cogentco.com (154.54.88.46)
9 33.93 ms 38.140.186.234
10 42.06 ms 192.168.255.249
11 33.82 ms 138.113.19.15
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 562.69 seconds